Threat Actor LARVA-208 Targets Web3 Developers via Fake AI Platform Malware
Sophisticated spearphishing campaign delivers the Fickle infostealer via malicious 'audio driver' download, compromising developer credentials and project supply chains.
Malicious Chrome Extension Steals Seed Phrases via Covert Sui Transactions
A high-ranking malicious wallet extension weaponized the Sui blockchain to covertly exfiltrate user mnemonics, bypassing traditional network monitoring.
New Phishing-as-a-Service Drainer Targets Individual Crypto Wallet Users
The Eleven Drainer PhaaS threat leverages social engineering to bypass user security, tricking victims into signing unlimited token allowances and draining all assets.
Wallet Users Targeted by New Eleven Drainer Phishing-as-a-Service Syndicate
New PhaaS syndicate, Eleven Drainer, weaponizes social engineering and malicious signatures to bypass wallet security, enabling full asset sweeps.
Humanity Protocol and World Drive Decentralized Identity Mainstream Adoption
Humanity Protocol and World ID advance verifiable digital identity, integrating biometric authentication and strategic partnerships to secure user interactions across Web3 and traditional platforms.
UPCX Payment Platform Suffers $70 Million Admin Key Compromise
A compromised administrative key allowed an attacker to upgrade a critical smart contract, enabling unauthorized fund withdrawals.
JavaScript Ecosystem Suffers Supply Chain Attack Hijacking Crypto Transactions
A compromised NPM maintainer account enabled malicious code injection, silently redirecting user crypto transactions to attacker wallets.
User Loses $119k WBTC to Phishing Scam Exploiting Approval Mechanism
A sophisticated phishing campaign leveraged social engineering and malicious `increaseApproval` transactions to drain user funds, highlighting critical authorization vulnerabilities.
Seedify Bridge Exploited, $1.7 Million Lost to Private Key Compromise
A compromised developer private key enabled unauthorized token minting and cross-chain asset draining, highlighting critical bridge security vulnerabilities.
